Filter Resources

Webinar
On-demand webinar featuring Jamie Jones, Federal Solutions Engineer, GitHub and David Larrimore, CTO U.S. DHS, Immigration and Customs Enforcement to learn how you can securely build and share code that is compliant with the Federal Source Code Policy. GitHub lets developers at agencies collaborate to ship better code, securely on your own servers or AWS GovCloud and Azure Government. 
Webinar
Oracle's Data Integration products deliver pervasive and continuous access to timely and trusted data across heterogeneous systems. Its comprehensive capabilities include real-time and bulk data movement, transformation, bi-directional replication, metadata management, data services, and data quality for customer and product domains. 
Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Webinar
Join DLT for a discussion of going to the cloud and what you can do to assess the readiness of your own technology, staff and clients for the move.
Other
PPI Group 2017 May through August training catalog. PPI hosts courses to meet all your Autodesk needs from InfraWorks and AutoCAD to Revit, taught at all skill levels.
Whitepaper
Training plays a critical role in maximizing job performance. Advanced Solutions’ CAD Club memberships provide Autodesk software users with a convenient and economical path to becoming highly skilled software users.
Whitepaper
Today more than ever, there is a need to protect your IoT devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor.
Data Sheet
Protecting sensitive and mission critical data from internal and external threats is paramount at all government agencies. DLT Solutions provides the most innovative cloud security, governance, risk management and compliance technologies to the public sector through our partnership with Evident.io. The Evident Security Platform (ESP) provides government agencies with continuous visibility into the security posture of their systems, guided response and remediation, and the ability to generate documentation to show compliance.
Data Sheet
Protecting sensitive and mission critical data from internal and external threats is paramount at all government agencies. DLT Solutions provides the most innovative cloud security, governance, risk management and compliance technologies to the public sector through our partnership with Evident.io. The Evident Security Platform (ESP) provides government agencies with continuous visibility into the security posture of their systems, guided response and remediation, and the ability to generate documentation to show compliance.
Whitepaper
Every day, government agencies process vast amounts of sensitive informationvital to U.S. national security. Loss of this sensitive data or unauthorized accessto the systems and networks it resides on can have serious national securityconsequences, ranging from privacy issues and public embarrassment toglobal economic and political turmoil.
Whitepaper
To ensure an acceptable and consistent level of confidentiality, integrity andavailability of information assets, government IT organizations must comply witha growing number of regulations, directives and standards. The main objective isto eliminate intrusions (confidentiality), protect sensitive information (integrity)and mitigate exposure to denial of service cyberattacks (availability).
Whitepaper
ForeScout CounterACT™ now provides bi-directional information sharing withMcAfee® Threat Intelligence Exchange over the McAfee Data Exchange Layer.With this integration, customers can leverage system-wide threat intelligencefrom all McAfee security components, and protect their networks fromunmanaged and personally owned (BYOD) Windows devices.
Whitepaper
The Intel® Security Integration Module enables ForeScout CounterACT™ to integratebi-directionally with McAfee® ePolicy Orchestrator® (ePO™) and McAfee® ThreatIntelligence Exchange. This enables contextual sharing of endpoint and threat intelligencebetween CounterACT and Intel Security products, and automation of response workflowsfor risk mitigation and threat defense
Whitepaper
ForeScout IoT EnterpriseRisk Report explorescommon IoT devicesthat make organizationsvulnerable to dangerous –if not disastrous – attacks.
Whitepaper
Without a cutting-edge IoT security solution—one that begins with agentlessvisibility—IoT devices are invisible (and potentially unwanted) guests on yournetwork. Video surveillance systems, projectors, smart copiers and printers,industrial controls and HVAC systems are common in most businesses today.

Pages